UACA: Unified Access Control Approach For Heterogeneous Database Based-on Service Data Object

Main Article Content

Sadoon Hussein
Nadia Maan

Abstract

Abstract: The requirement for data interchange, access, and retrieval from diverse databases. This requirement is getting more and more crucial. However, retrieving this data from a heterogeneous database necessitates juggling many kinds of query languages, data models, and structure. The goal of this project is to create a unified access control approach (UACA), which will be managed by service data object (SDO) technologies and will be based on an agent mechanism for application access to business databases. To create a unified data access control, applications must be submitted through a UACA. To prevent a direct link to the database and application security threats, unified access control isolates applications from databases. Application systems submit a request for identity authentication to the database access control system using the data access protocol of the access control system. Data are finally transmitted to the application system after identity authentication, data gathering, and data transmission. This investigation led to the creation of a client-middle layer, which is also in charge of transformation and optimization, to ensure uniform data access control and access to the heterogeneous database. It also manages system communication using the TCP/IP protocol to guarantee the accuracy and reliability of the connection. SDO data retrieval offers strong adaptability and system compatibility.


IMG8686.jpg


Article Details

How to Cite
Hussein, S., & Maan, N. (2023). UACA: Unified Access Control Approach For Heterogeneous Database Based-on Service Data Object. Technium: Romanian Journal of Applied Sciences and Technology, 9, 26–40. https://doi.org/10.47577/technium.v9i.8686
Section
Articles

References

Brodersen K, Rothwein TM, Malden MS, Chen MJ, Annadata A, inventors; Siebel Systems Inc, assignee. Database access method and system for user role defined access. United States patent US 6,732,100. (2004).

Thomas TM, Books MT. Java data access: JDBC, JNDI, and JAXP. M&T Books; (2002).

Ausanka-Crues R. Methods for access control: advances and limitations. Harvey Mudd College;301:20, (2001).

Sheth AP, Larson JA. Federated database systems for managing distributed, heterogeneous, and autonomous databases. ACM Computing Surveys (CSUR);22(3):183-236, (1990).

Nong RH. Database Grid: the Multi-database Built on the Grid [J]. Computer Engineering and Applications.;2:050,(2006).

Programming language. Retrieval from: https://wikivisually.com/wiki/ Programming_language, (2017).

Volkoff O, Strong DM, Elmes MB. Understanding enterprise systems-enabled integration. European Journal of Information Systems. 14(2):110-20, (2005).

Yan, Z., Li, X., Wang, M. and Vasilakos, A.. Flexible data access control based on trust and reputation in cloud computing. IEEE Transactions on Cloud Computing, (2017).

Labrinidis A, Jagadish HV. Challenges and opportunities with big data. Proceedings of the VLDB Endowment.5(12):2032-3, (2012).

MacLennan, E. and Van Belle, J.P.. Factors affecting the organizational adoption of service-oriented architecture (SOA). Information Systems and e-Business Management, 12(1), pp.71-100, (2014).

Laskey KB, Laskey K. Service oriented architecture. Wiley Interdisciplinary Reviews: Computational Statistics.1(1):101-5, (2009).

Berg DC, Makin N, Rich LS, Schacher RL, inventors; International Business Machines Corp, assignee. Method and apparatus for generating a service data object based service pattern for an enterprise Java beans model. United States patent US 7,769,747. 2010 Aug 3.

Ferguson DF, Stockton ML. Service-oriented architecture: Programming model and product architecture. IBM Systems Journal.44(4):753-80, (2005).

Yan, Z., Li, X., Wang, M. and Vasilakos, A., 2017. Flexible data access control based on trust and reputation in cloud computing. IEEE Transactions on Cloud Computing

van de Riet RP, Kersten ML, de Jonge W, Wasserman AI. Privacy and security in information systems using programming language features. Information Systems. 8(2):95-103, (1983).

Retrieval form: https://msdn.microsoft.com/en-us/library/cc505882.aspx, (2017).

Badshah F, Shah ST, Jan SR, Rahman IU. Communication between multiple processes on same device using TCP/IP suite. InCommunication, Computing and Digital Systems (C-CODE), International Conference on 2017 Mar 8 (pp. 148-151). IEEE, (2017).

Khan AS, inventor; Oracle America Inc, assignee. System and method for automatically generating XML schema for validating XML input documents. United States patent US 9,286,275. (2016).

Lok SH, Dimantha R, inventors; Protel Communications Limited, assignee. Unified integration management—contact center portal. United States patent US 9,521,207. 2016 Dec 13.

Jirkovský, V., Obitko, M. and Mařík, V.. Understanding Data Heterogeneity in the Context of Cyber-Physical Systems Integration. IEEE Transactions on Industrial Informatics, 13(2), pp.660-667, (2017).

Haritha K, Jawaharlal M, Prasad PM, Chakravathi PK. Design and development of controller software for MAS receiver using socket programming. InComputational Intelligence in Data Mining—Volume 1 2016 (pp. 113-120). Springer, New Delhi.

Binkley, J. "TCP/IP-Socket Programming," (2016).

Burch LL, Earl DG, inventors; Micro Focus Software Inc, assignee. Multiple access authentication. United States patent US 9,391,978, (2016).

Zaharia M, Xin RS, Wendell P, Das T, Armbrust M, Dave A, Meng X, Rosen J, Venkataraman S, Franklin MJ, Ghodsi A. Apache spark: a unified engine for big data processing. Communications of the ACM. 59(11):56-65, (2016).

Alkasem A, Liu H, Zuo D, Algarash B. Cloud Computing: A model Construct of Real-Time Monitoring for Big Dataset Analytics Using Apache Spark. InJournal of Physics: Conference Series 2018 (Vol. 933, No. 1, p. 012018). IOP Publishing, (2018).